How To Set Up Vpn Tunnels In Special Circumstances; Using Auto Policy To Configure Vpn Tunnels - NETGEAR DG834GSP Reference Manual

Adsl modem wireless router
Hide thumbs Also See for DG834GSP:
Table of Contents

Advertisement

Reference Manual for the ADSL Modem Wireless Router DG834GSP

How to Set Up VPN Tunnels in Special Circumstances

When the VPN Wizard and its VPNC defaults (see
circumstances, use one of the following alternatives:
Auto Policy—for a typical automated Internet Key Exchange (IKE) setup, see
Policy to Configure VPN Tunnels" on page
the authentication scheme and automatically generate the encryption keys.
Manual Policy—for a Manual Keying setup in which you must specify each phase of the
connection, see
"Using Manual Policy to Configure VPN Tunnels" on page
Policy does not use IKE. Rather, you manually enter all the authentication and key parameters.
You have more control over the process, however the process is more complex and there are
more opportunities for errors or configuration mismatches between your DG834GSP and the
corresponding VPN endpoint gateway or client workstation.

Using Auto Policy to Configure VPN Tunnels

You need to configure matching VPN settings on both VPN endpoints. The outbound VPN
settings on one end must match to the inbound VPN settings on other end, and vice versa.
See
"Example of Using Auto Policy" on page 8-43
Configuring VPN Network Connection Parameters
All VPN tunnels on the ADSL Modem Wireless Router require configuring several network
parameters. This section describes those parameters and how to access them.
The most common configuration scenarios will use IKE to manage the authentication and
encryption keys. The IKE protocol performs negotiations between the two VPN endpoints to
automatically generate and update the required encryption parameters.
Click the VPN Policies link of the main menu, and then click the Add Auto Policy button to
display the VPN - Auto Policy menu shown in
8-38
Table
8-2) are not appropriate for your special
8-38. Auto Policy uses the IKE protocol to define
for an example of using Auto Policy.
Figure
8-37.
v1.0, June 2007
"Using Auto
8-48. Manual
Virtual Private Networking

Advertisement

Table of Contents
loading

Table of Contents